Patents by Inventor William K. Hollis
William K. Hollis has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11038913Abstract: Disclosed herein is a system for generating and displaying information useful to help a security analyst understand a scale and a root cause of a potential security issue associated with a resource. The resource can include a server, a storage device, a user device (e.g., a personal computer, a tablet computer, a smartphone, etc.), a virtual machine, networking equipment, etc. The resource may be one that is under control of an entity operating a security operations center. Additionally or alternatively, the resource may be one that is configured to be monitored by the security operations center. The information provides the security analyst with a broader context of the potential security issue based on relationships between the potential security issues and other security issues. Consequently, the information enables the security analyst to implement more efficient and effective actions to handle the potential security issue.Type: GrantFiled: April 19, 2019Date of Patent: June 15, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Hani Hana Neuvirth, Sangeetha Madderla, Larry J. Matuska, William K. Hollis, Gueorgui Chkodrov, Yotam Livny
-
Publication number: 20200336505Abstract: Disclosed herein is a system for generating and displaying information useful to help a security analyst understand a scale and a root cause of a potential security issue associated with a resource. The resource can include a server, a storage device, a user device (e.g., a personal computer, a tablet computer, a smartphone, etc.), a virtual machine, networking equipment, etc. The resource may be one that is under control of an entity operating a security operations center. Additionally or alternatively, the resource may be one that is configured to be monitored by the security operations center. The information provides the security analyst with a broader context of the potential security issue based on relationships between the potential security issues and other security issues. Consequently, the information enables the security analyst to implement more efficient and effective actions to handle the potential security issue.Type: ApplicationFiled: April 19, 2019Publication date: October 22, 2020Inventors: Hani Hana NEUVIRTH, Sangeetha MADDERLA, Larry J. MATUSKA, William K. HOLLIS, Gueorgui CHKODROV, Yotam LIVNY
-
Publication number: 20180270109Abstract: A network configuration management system can determine configuration settings for network devices and detect configuration setting errors in the configuration settings that can cause security vulnerabilities. The configuration setting errors can include a configuration setting value error or a supplemental access setting error. If the configuration settings include the configuration setting value error, a first remedial action can be executed, and if the configuration settings include the supplemental access setting error, a second remedial action can be executed. Also, network interface scanning can be initiated using network addresses extracted from the configuration settings.Type: ApplicationFiled: March 15, 2017Publication date: September 20, 2018Applicant: Microsoft Technology Licensing, LLCInventor: William K. HOLLIS
-
Patent number: 9893975Abstract: An in-line network tap includes a network tap chip that is configured to analyze or otherwise process data packets as the data packets are transmitted within a network. The network tap chip can be embedded within a communication cable, such as an Ethernet or USB cable, either within the flexible cable portion of the cable or within a connector on either end of the communication cable. Alternatively, the network tap chip can be embedded within a transceiver. The in-line network tap can perform various processing including monitoring network performance, facilitating remote troubleshooting, data buffering, and intrusion detection and prevention.Type: GrantFiled: June 25, 2015Date of Patent: February 13, 2018Assignee: Microsoft Technology Licensing, LLCInventor: William K Hollis
-
Publication number: 20170264427Abstract: System and methods for encrypting data, such as plaintext or binary data, on electronic devices are described. An electronic device can encrypt the data by receiving a string of one or more characters associated with the data to be encrypted, determining an entropy for an encrypted string, determining a position for each character of the one or more characters, generating an encrypted string for each character using the determined entropy and position of the respective character, and generating an encrypted message by concatenating the encrypted strings of the one or more characters together. In some examples, the electronic device encrypts the data using one or more pseudo-random number generators. In some examples, the electronic device can offset the one or more characters before the encrypting and/or offset characters in the encrypted strings after the encrypting. The electronic device can then send the encrypted message to another electronic device for decrypting.Type: ApplicationFiled: March 11, 2016Publication date: September 14, 2017Inventor: William K. Hollis
-
Publication number: 20160380868Abstract: An in-line network tap includes a network tap chip that is configured to analyze or otherwise process data packets as the data packets are transmitted within a network. The network tap chip can be embedded within a communication cable, such as an Ethernet or USB cable, either within the flexible cable portion of the cable or within a connector on either end of the communication cable. Alternatively, the network tap chip can be embedded within a transceiver. The in-line network tap can perform various processing including monitoring network performance, facilitating remote troubleshooting, data buffering, and intrusion detection and prevention.Type: ApplicationFiled: June 25, 2015Publication date: December 29, 2016Inventor: William K Hollis
-
Publication number: 20110173429Abstract: A method to reduce and thereby improve the initial program load time of a computing apparatus operating system and thus provides for near instantaneous user interaction. When practicing the instant invention, a computing apparatus operating system or application processing component is loaded neither sequentially nor completely, but rather on an as required basis. The invention's “required only” loading of processing components persist through subsequent operation and shut down of the computing apparatus with each loaded task creating a checkpoint record of processing modifications to non-volatile memory. Such checkpointing allows shut down processing of the apparatus to consist of merely flushing memory buffers in the apparatus checkpointed non-volatile memory of the apparatus to permanent storage and powering off of the apparatus, with subsequent initial program load (IPL) sequencing referencing the checkpointed records to minimize future system initialization elapsed time.Type: ApplicationFiled: March 28, 2011Publication date: July 14, 2011Inventor: William K. Hollis
-
Publication number: 20090319547Abstract: A compression algorithm may use a hash function to compress a file. The hash function may be selected to have multiple collisions so that a compressed file may include the hash values and indexes to the collisions. In some cases, a database of data and their hash values may be built during compression, while in other cases a preexisting database may be used. A preexisting database may be used as a shared secret to provide security to the compressed file. In many embodiments, the compression algorithm may be used recursively to reduce the size of the file by using the same or different hash functions.Type: ApplicationFiled: June 19, 2008Publication date: December 24, 2009Applicant: Microsoft CorporationInventor: William K. Hollis
-
Patent number: 7299346Abstract: A method to reduce and thereby improve the initial program load time of a computing apparatus operating system and thus provides for near instantaneous user interaction. When practicing the instant invention, a computing apparatus operating system or application processing component is loaded neither sequentially nor completely, but rather on an as required basis. The invention's “required only” loading of processing components persist through subsequent operation and shut down of the computing apparatus with each loaded task creating a checkpoint record of processing modifications to non-volatile memory. Such checkpointing allows shut down processing of the apparatus to consist of merely flushing memory buffers in the apparatus checkpointed non-volatile memory of the apparatus to permanent storage and powering off of the apparatus, with subsequent initial program load (IPL) sequencing referencing the checkpointed records to minimize future system initialization elapsed time.Type: GrantFiled: January 14, 2003Date of Patent: November 20, 2007Inventor: William K. Hollis
-
Patent number: RE42936Abstract: A method to reduce and thereby improve the initial program load time of a computing apparatus operating system and thus provides for near instantaneous user interaction. When practicing the instant invention, a computing apparatus operating system or application processing component is loaded neither sequentially nor completely, but rather on an as required basis. The invention's “required only” loading of processing components persist through subsequent operation and shut down of the computing apparatus with each loaded task creating a checkpoint record of processing modifications to non-volatile memory. Such checkpointing allows shut down processing of the apparatus to consist of merely flushing memory buffers in the apparatus checkpointed non-volatile memory of the apparatus to permanent storage and powering off of the apparatus, with subsequent initial program load (IPL) sequencing referencing the checkpointed records to minimize future system initialization elapsed time.Type: GrantFiled: November 6, 2009Date of Patent: November 15, 2011Inventor: William K. Hollis